Site icon TheCyberThrone

Trust Is designed Not Assumed: CISSP Executive Briefing on Access Controls

Advertisements


Access control is not merely a technical enforcement mechanism—it is a business risk control system that determines how trust, authority, and accountability are exercised across an organization. For CISOs and executives, access control failures rarely appear as isolated incidents; they surface as systemic governance breakdowns, audit findings, insider abuse, regulatory penalties, or breach blast-radius amplifiers.

From a CISSP perspective, access control models answer three executive questions:

  1. Who is allowed to do what?
  2. Under which conditions?
  3. With what business risk trade-off?

1. Core Access Control Models (Policy Intent)

Discretionary Access Control (DAC)

DAC is ownership-driven. The resource owner decides access.

DAC is common in file shares and legacy systems and often persists unnoticed, creating long-term exposure.

Mandatory Access Control (MAC)

MAC enforces centralized, label-based access decisions.

MAC removes human discretion, making it resilient but costly to operate.

Role-Based Access Control (RBAC)

RBAC assigns permissions based on job roles.

RBAC is foundational but insufficient alone in dynamic, cloud-native enterprises.

Rule-Based Access Control

Access is granted based on system-enforced rules (time, location, network).

Attribute-Based Access Control (ABAC)

Decisions are based on attributes (user, device, environment, risk).

ABAC enables adaptive trust decisions but demands strong governance.

2. Formal Security Models

Bell–LaPadula (Confidentiality)

Used where data disclosure is the primary concern.

Biba Model (Integrity)

Critical for financial systems, OT, and safety systems.

Clark–Wilson Model (Commercial Integrity)

This is the most business-aligned model, mapping directly to SOX, fraud prevention, and enterprise controls.

Brewer–Nash (Chinese Wall)

Used in consulting, legal, financial advisory, where ethical boundaries matter more than classification labels.

3. Additional CISSP-Referenced Models

These models help CISOs reason about systemic risk, not implement controls directly.

4. Access Control Maturity Model

Level 1 – Ad Hoc

Level 2 – Defined

Level 3 – Managed

Level 4 – Adaptive

Level 5 – Optimized (Zero Trust)

Executives should assess where they are vs. where the business risk demands them to be.

5. CISO Decision Matrix

Decision Driver Recommended Model
Model Bias RBAC + Clark–Wilson
Regulatory compliance RBAC + Clark–Wilson
Insider threat Biba + Separation of Duties
Cloud & APIs ABAC
National security MAC + Bell–LaPadula
Ethical conflict risk Brewer–Nash
Zero Trust strategy ABAC + Continuous Authentication

No single model is sufficient. Layering is mandatory.

6. Strategic Risks CISOs Must Address

Most breaches do not exploit exotic flaws—they exploit over-trusted identities.

Executive Takeaway

Access control models are governance instruments, not just technical constructs. Mature organizations evolve from static permission assignment to continuous trust evaluation, where access reflects:

For CISOs, the real challenge is not choosing a model—but ensuring access decisions consistently reflect business intent, regulatory obligation, and evolving threat reality.

Exit mobile version